A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem
暂无分享,去创建一个
[1] Kwangjo Kim,et al. Authentication and payment protocol preserving location privacy in mobile IP , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[2] Kazue Sako,et al. Fault tolerant anonymous channel , 1997, ICICS.
[3] Reihaneh Safavi-Naini,et al. An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System , 2004, Cryptographic Algorithms and their Uses.
[4] Birgit Pfitzmann,et al. Breaking Efficient Anonymous Channel , 1994, EUROCRYPT.
[5] Ari Juels,et al. Targeted Advertising ... And Privacy Too , 2001, CT-RSA.
[6] Jun Furukawa,et al. Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability , 2004, Public Key Cryptography.
[7] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[8] Reihaneh Safavi-Naini,et al. Breaking and Mending Resilient Mix-Nets , 2003, Privacy Enhancing Technologies.
[9] Douglas Wikström,et al. Five Practical Attacks for "Optimistic Mixing for Exit-Polls" , 2003, Selected Areas in Cryptography.
[10] C. A. Neff. Verifiable Mixing (Shuffling) of ElGamal Pairs , 2004 .
[11] Markus Jakobsson,et al. Optimistic Mixing for Exit-Polls , 2002, ASIACRYPT.
[12] J. Markus,et al. Millimix: Mixing in Small Batches , 1999 .
[13] Stefan A. Brands,et al. An Efficient Off-line Electronic Cash System Based On The Representation Problem. , 1993 .
[14] Kaoru Kurosawa,et al. Efficient Anonymous Channel and All/Nothing Election Scheme , 1994, EUROCRYPT.
[15] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[16] Markus Jakobsson,et al. A Practical Mix , 1998, EUROCRYPT.
[17] Markus Jakobsson,et al. An optimally robust hybrid mix network , 2001, PODC '01.
[18] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[19] Kaoru Kurosawa,et al. Attack for Flash MIX , 2000, ASIACRYPT.
[20] Dan Boneh,et al. Almost entirely correct mixing with applications to voting , 2002, CCS '02.
[21] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[22] Masayuki Abe,et al. Remarks on Mix-Network Based on Permutation Networks , 2001, Public Key Cryptography.
[23] Satoshi Obana,et al. An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling , 2002, Financial Cryptography.
[24] Masayuki Abe,et al. A Length-Invariant Hybrid Mix , 2000, ASIACRYPT.
[25] Yossi Matias,et al. How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.
[26] Kazue Sako,et al. An Efficient Scheme for Proving a Shuffle , 2001, CRYPTO.
[27] Markus Jakobsson,et al. Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.
[28] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[29] Yvo Desmedt,et al. How to Break a Practical MIX and Design a New One , 2000, EUROCRYPT.
[30] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[31] Markus Jakobsson,et al. Mix-Based Electronic Payments , 1998, Selected Areas in Cryptography.
[32] Adi Shamir,et al. How to share a secret , 1979, CACM.
[33] Markus Jakobsson,et al. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking , 2002, USENIX Security Symposium.
[34] C. Andrew Neff,et al. A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.
[35] Masayuki Abe,et al. Combining Encryption and Proof of Knowledge in the Random Oracle Model , 2004, Comput. J..
[36] Masayuki Abe,et al. Mix-Networks on Permutation Networks , 1999, ASIACRYPT.
[37] David Pointcheval,et al. Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks , 2001, ASIACRYPT.
[38] Reihaneh Safavi-Naini,et al. Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security , 2004, ACNS.
[39] Douglas Wikström,et al. The Security of a Mix-Center Based on a Semantically Secure Cryptosystem , 2002, INDOCRYPT.
[40] Richard E. Overill,et al. Foundations of Cryptography: Basic Tools , 2002, J. Log. Comput..